10.08.2015 Views

EXPLOITING EMBEDDED SYSTEMS THE SEQUEL!

Exploitation - CanSecWest

Exploitation - CanSecWest

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Injector 2.0• Monitors HTTP downloads• Injects and modifies PE header of executabledownload• Executes original executable and appendedexecutable• Only one packet required to infect executable• Injector will run on any ARM based routerCopyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 40

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!